Preview

System Development Life Cycle

Powerful Essays
Open Document
Open Document
1234 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
System Development Life Cycle
System Development Life Cycle
Irene Anderson
CMGT/582 - CIS Security and Ethics
June 23, 2014
Krystal Hall
System Development Life Cycle
“Both risk governance and regulatory requirements emphasize the need for an effective risk management plan. And to effectively manage risk, it is important that definitions of the risk management plan objectives are clear from the start, so that the plan can head in the right direction. Risk management of information assets also provides a strong basis for information security activities, such as controlling risk to the confidentiality, integrity, and availability of information aligning mitigation efforts with business objectives, and providing cost-effective solutions after analyzing security risks” (University of Phoenix - Skillsoft®, 2012).
A security development life cycle is a guide for ensuring that security is continually being improved. Security lifecycle implementation requires policy and standards implementation from the start. Security policy and standards are the foundation to any component of a security plan. These are especially critical in both the assessment and protection phase of the lifecycle. The assessment phase will use the standards and policy as the basis of conducting the assessment. Resources will be evaluated against the security policy. During the protection phase, resources will be configured to meet policy and standards.
Security should be addressed at all stages of the systems development life cycle (SDLC). “The systems development life cycle (SDLC) is a methodology for the design and implementation of an information system. A methodology is a formal approach to solving a problem by means of a structured sequence of procedures. Using a methodology ensures a rigorous process with a clearly defined goal and increases the probability of success. Completion of methodology adoption triggers activities such as, establishing key milestones and team selection ensuring accountability for



References: National Security Telecommunications and Information Systems Security Committee. (2000). National Information Assurance Certification and Accreditation Process (NIACAP). Retrieved from https://www.fismacenter.com/nstissi_1000.pdf Onpointcorp.com. (n.d.). Incorporating Security into the System Development Life Cycle (SDLC). Retrieved from http://www.onpointcorp.com/uploads/137/doc/Security_in_the_SDLC.pdf SANS Institute. (2007). Certification and Accreditation (C&A) Vs System Development Life Cycle Management (SDLC). Retrieved from http://www.sans.org/reading-room/whitepapers/auditing/certification-accreditation-c-a-system-development-life-cycle-management-sdlc-1961 University of Phoenix - Skillsoft®. (2012). CISM 2012: Information Risk Management and Compliance (Part 1): Information Risk Management Overview. Retrieved from https://library.skillport.com/courseware/Content/cca/sp_cisn_a04_it_enus//output/t4/misc/transcript.html Whitman, M. E. (2012). Principles of Information Security (4th ed.). Mason, OH: Cengage Learning.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    What exactly is SDLC? SDLC stands for Software Development Life Cycle. SDLC is a series of phases that provide model for the development and lifecycle management of an application and/or software. Within SDLC, security should also be considered. How is the application going to be secured? Are we using these phases to the best of our knowledge and incorporating as much security as possible? There are six phases within SDLC. They are Systems analysis, design, implementation, testing, acceptance and deployment, and maintenance. There are four ways to secure SDLC. They are Governance, Construction, Verification, and Deployment. Within each way to secure SDLC, Governance there is strategy and metrics, policy and compliance, education and guidance, threat assessment, security requirements, security architecture, design review, code review, security testing, vulnerability management, hardening environments, and operations.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    COM 220 Week 4 Checkpoint

    • 398 Words
    • 3 Pages

    Why is the systems development life cycle important (SDLC)? Who participates in the SDLC methodology?…

    • 398 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 7 Integrity Maintain valid, uncorrupted, and accurate information.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.…

    • 2427 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays